Network Monitoring and Security in Hybrid Networks. Jason Echols
|
|
- Reynard Spencer Burns
- 7 years ago
- Views:
Transcription
1 Network Monitoring and Security in Hybrid Networks Jason Echols
2 The MOST TRUSTED names in networking trust Test Security Visibility Enterprises trust IXIA to: Assess vendor equipment and applications Improve network security posture Improve network and application visibility and performance Service Providers trust IXIA to: Improve and speed service delivery Speed roll out of next gen services Improve network and application visibility and performance Equipment Manufacturers trust IXIA to: Develop next generation devices Speed time to market Improve performance and reliability Chip Fabricators trust IXIA to: Validate protocol conformance Speed time to market
3 3 Topics Industry Data on Change in the Network Network Visibility Challenges Customer ROI Examples Example Network Visibility Architectures
4 4 Growth in the Network Heavy traffic within the data center along with rapid growth. Source: Cisco Global Cloud Index (GCI): Forecast and Methodology,
5 5 Network Bandwidth Growing Rapidly Maximum networking link speeds within data center / core networks 100M 1G 10G 40G 100G 0% 10% 20% 30% 40% 50% Current Planned in 12 months Tools Challenged to Keep Pace! 2014 Enterprise Management Associates, Inc.
6 6 Bring Your Own Device (BYOD) 89% >10% 1 IN 4 Global IT professionals reporting personal devices on corporate networks Percentage of organizations that are fully aware of all the devices accessing their network Employed U.S. adults who have been a victim of malware or hacking on a personal device Image: Milton Security
7 It s More Than Growth, Speed, and BYOD Packet Flow is Changing 7 Regulatory Cloud Wireless SDN Security Mobile 7
8 8 8 Managing Change Requires Visibility Into The Network
9 9 Move towards Customer Service Approach ER >SOLOMONSAMU 成 龙 >ZUKAUSKIENEJAN Internet YOSHIMI>ИМЯ:DUBOVVICTOR> YMANSKIGRAZYNA>STAVENHO Transforms >GLASGOWSCOTL Communications 83>TL > 新 加 坡 ER >SOLOMONSAMU 成 龙 >ZUKAUSKIENEJAN YOSHIMI>ИМЯ:DUBOVVICTOR> Application & Data YMANSKIGRAZYNA>STAVENHO >GLASGOWSCOTL Explosion 83>TL > 新 加 坡 ER >SOLOMONSAMU 成 龙 >ZUKAUSKIENEJAN YOSHIMI>ИМЯ:DUBOVVICTOR> Consumerization YMANSKIGRAZYNA>STAVENHO >GLASGOWSCOTL of IT 83>TL > 新 加 坡 Packet Delivery Application Delivery Customer Service Delivery Network Operations Center Security Operations Center Customer Service Operations Center Late 1990 s
10 10 Tools, Tools and More Tools ER >SOLOMONSAMU 成 龙 >ZUKAUSKIENEJAN Internet YOSHIMI>ИМЯ:DUBOVVICTOR> YMANSKIGRAZYNA>STAVENHO Transforms >GLASGOWSCOTL Communications 83>TL > 新 加 坡 ER >SOLOMONSAMU 成 龙 >ZUKAUSKIENEJAN YOSHIMI>ИМЯ:DUBOVVICTOR> Application & Data YMANSKIGRAZYNA>STAVENHO >GLASGOWSCOTL Explosion 83>TL > 新 加 坡 ER >SOLOMONSAMU 成 龙 >ZUKAUSKIENEJAN YOSHIMI>ИМЯ:DUBOVVICTOR> Consumerization YMANSKIGRAZYNA>STAVENHO >GLASGOWSCOTL of IT 83>TL > 新 加 坡 Infrastructure Management Customer Service Late 1990 s
11 11 Tools Need End-to-End Network Access Production Network Tools Organization SPAN Ports Taps Inline Bypass Campus Remote Office Branch Office Network Management Network Operations Core SPAN Ports Taps Inline Bypass SPAN Ports Taps Inline Bypass This isn t happening! Why? Application Performance Performance Management Security Admin Server Admin Data Center Private Cloud Virtualization Security Intelligence WAN Carrier Networks Wired and Mobile SPAN Ports Taps Inline Bypass Customer Experience Audit & Privacy Forensics
12 New Needs to Solve the Tools Problem Production Network Tools Organization Campus Remote Office Branch Office Visibility Needs End-to-End Visibility Tool access to any point in the network Network Operations Scalability Scales to fit the needs of any network Performance Management Core Manageability Flexible macro-level management Security Admin Data Center Private Cloud Virtualization Control View exactly the information you need Reduce Costs Reduce tool costs & administrative burdens Server Admin Audit & Privacy WAN Carrier Networks Wired and Mobile Forensics 12
13 Benefits of Visibility Architecture Deployment Security Services Firm Challenge: Before we deployed the Ixia solution, we were collecting TCP dumps to UNIX boxes and using custom scripting to try and compare traffic on each side of the firewall Ultimately, we took service penalty hits because it took a long time to identify and resolve the issue. IT Manager Hard ROI (5yr. Vs $150k solution) Reduced cost of instrumentation per Site (4:1) $200,000 Reduced SLA penalties $50,000 TOTAL Hard ROI $250,000 Soft ROI 13 Escalation staff can cover more incidents per engineer Reduces future costs for access and instrumentation, reduces penalty risk for service failures
14 Benefits of Visibility Architecture Deployment University of Texas Challenges: Volume was really becoming an issue and dropping packets was simply not acceptable - CISO Lost data from overloaded switches Rapid Growth with mandated monitoring 750,000 Devices on state networks Hard ROI (5yr. Vs $700k solution) Reduced costs in IDS Monitors (4:1) Elimination in Smaller Sensors $216,000 Reduced Rack Space and Power $300,000 TOTAL Hard ROI $846,000 Soft ROI 14 $320,000 Reliable support for increasing volumes of data, inc. 40G Can add new tools without stressing or endangering primary monitoring
15 Visibility Components and Sample Architectures 15
16 What is a Tap?
17 What is a Packet Broker?
18 Visibility Architecture Designs Medium Enterprise Large Enterprise Carrier Networks
19 Medium Enterprise Design Monitoring Tools Network Visibility Management Network & App Performance Security Intelligence NTO 2113 Packet Broker Protocol Analyzer Servers with Phantom Tap Network Taps Campus Cloud Branch Core Data Center
20 Large Enterprise Design Monitoring Tools Protocol Analyzer Network Performance Application Performance Security Intelligence VoIP Monitor Network Visibility Management Servers with Phantom Tap NTO 5288 Packet Broker NTO 7300 Packet Broker Net Optics Taps Campus Cloud Branch Core Data Center
21 Carrier Design Monitoring Tools Probe Probe Probe Network Performance Application Performance Security Intelligence LTE Monitor Network Visibility Management NTO 7300 NFV Environments GTP Session Controller NetOptics Taps MME PCRF HSS AS SLF SGW PGW EPC IMS
22 22 Summary Focus on Improved Visibility for Improving Customer Service IT Evolving Customer Service Approach Eliminating Visibility Blind Spots Scalable, end-to-end network, application and user visibility Integrated virtual & physical solution Fail-safe, inline security The Answer: Ixia s Visibility Architecture ER >SOLOMONSAMUEL>D 成 龙 >ZUKAUS KIENEJANINA>UPATIONCONTRACTOR>SALARY$54GRANT BOB>KIMMINJUN> SCOVERCARD >ST AVENHDE5010CC>SCHODERJURGEN>MOBINAUSTALLIA> HYPOTHEKENZAHLUNYOSHIMI>ИМЯ:DUBOVVICTOR>NUM
23 Thank you
24 Inline Bypass Design Normal Operation Traffic routes through IPS Monitored with custom heartbeat Switch programmed to fail open/closed Managed via CLI, Web, etc. Optional NPB to route through multiple security devices Bypass Switch IPS Security Monitoring Tool Bypass Mode Traffic bypasses the IPS Security tool(s) can be replaced/upgraded without interruption Bypass Switch IPS Security Monitoring Tool (down/removed/upgrading)
25 Virtualization Design (detail)
Overcoming The Blind Spots in Your Virtualized Data Center
Overcoming The Blind Spots in Your Virtualized Data Center Matt Percival Sales Manager Northern Europe Stand C4 2014 Ixia Inc. Outline Virtualization Overview Network Monitoring Basics Implementing a Monitoring
More informationBest Practices In Monitoring High-Speed Ethernet (HSE)
Best Practices In Monitoring High-Speed Ethernet (HSE) Chip Webb VP Technology April 2013 1 Best Practices In Monitoring Even Higher Speed Ethernet Chip Webb VP Technology April 2013 2 Outline Increasing
More informationVSS - Game Changing Technology
VSS - Game Changing Technology Dean Beaver Vice President of Sales Danaher Business Platforms Test & Measurement $3.0B Environmental $3.3B Dental $2.1B Life Sciences & Diagnostics $6.8B Industrial Technologies
More informationCOMMAND YOUR DATA CENTER
Best Practices Guide I Data Center COMMAND YOUR DATA CENTER How to Thrive In the Changing Landscape The demands to virtualize, scale, and implement new applications while conducting security, forensics,
More informationWhite Paper. Optimizing Visibility, Control and Performance of Network Traffic
White Paper Optimizing Visibility, Control and Performance of Network Traffic 26601 Agoura Road, Calabasas, CA 91302 Tel: 818.871.1800 Fax: 818.871.1805 www.ixiacom.com 915-6598-01 Rev. B, June 2013 2
More information10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]
[ WhitePaper ] 10 10 METRICS TO MONITOR IN THE LTE NETWORK. Abstract: The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert service-impacting
More informationActive Visibility for Multi-Tiered Security // Solutions Overview
Introduction Cyber threats are becoming ever more sophisticated and prevalent. Traditional security approaches such as firewalls and anti-virus protection are not equipped to mitigate and manage modern
More informationInnovate, Integrate, Lead
Innovate, Integrate, Lead Ixia s Global Solution Provider Partner Program Application Performance and Security Resilience 86 of the Fortune 100 Profitability. Brand reputation. Customer loyalty. 50 of
More informationMarket Update Intelligent Network Packet Brokers
Market Update Report Intelligent Network Packet Brokers Explaining a New Network Infrastructure Category By Bob Laliberte, Senior Analyst July 2012 2012, The Enterprise Strategy Group, Inc. All Rights
More informationGame changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
More informationEfficient Network Monitoring Access
Abstract Organizations that rely on the reliability, security, and performance of their networks can no longer afford to wait for outages or security breaches to occur before installing test access points.
More informationNetwork Packet Monitoring Optimizations in Data Centre
March 2014, HAPPIEST MINDS TECHNOLOGIES Network Packet Monitoring Optimizations in Data Centre Author Dharmraj B Jhatakia 1 Copyright Information This document is an exclusive property of Happiest Minds
More informationVerizon Managed SD WAN with Cisco IWAN. October 28, 2015
Verizon Managed SD WAN with Cisco IWAN. October 28, 2015 Agenda Evolution of the WAN SD WAN delivers business outcomes Verizon s Managed IWAN solution Challenges for SD WAN adoption Deployment guidelines
More informationWhitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
More informationPractical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils
Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils 06/11/2012 1 Today s Talk Intro to LTE Networks Technical Details Attacks and Testing Defences Conclusions
More informationSecurity Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils
Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils 11/09/2012 1 Today s Talk Intro to 4G (LTE) Networks Technical Details Attacks and Testing Defences Conclusions 11/09/2012
More informationTowards Software Defined Cellular Networks
Towards Software Defined Cellular Networks Li Erran Li (Bell Labs, Alcatel-Lucent) Morley Mao (University of Michigan) Jennifer Rexford (Princeton University) 1 Outline Critiques of LTE Architecture CellSDN
More informationWhitepaper Unified Visibility Fabric A New Approach to Visibility
Whitepaper Unified Visibility Fabric A New Approach to Visibility Trends Networks continually change and evolve. Many trends such as virtualization and cloud computing have been ongoing for some time.
More informationWHITE PAPER. Tap Technology Enables Healthcare s Digital Future
WHITE PAPER Tap Technology Enables Healthcare s Digital Future www.ixiacom.com 915-6912-01 Rev. A, July 2014 2 Table of Contents Executive Overview... 4 Introduction... 4 HIT s foundation... 5 Keeping
More informationCarrier/WAN SDN. SDN Optimized MPLS Demo
Carrier/WAN SDN SDN Optimized MPLS Demo Problem Statement! Service Providers around the world have large investments in highly sophisticated and feature rich IP/MPLS network infrastructures for providing
More informationAPPENDIX 8 TO SCHEDULE 3.3
EHIBIT Q to Amendment No. 60 - APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT Q to Amendment No.
More informationDell Networking ARGOS 24/03/2016. Nicolas Roughol. Networking Sales Engineer. Tel : +33 6 79 34 90 28. nicolas_roughol@dell.com
Dell Networking ARGOS 24/03/2016 Nicolas Roughol Networking Sales Engineer Tel : +33 6 79 34 90 28 nicolas_roughol@dell.com Dell Networking Foundational elements for the future-ready enterprise Dell Networking
More informationAffording the Upgrade to Higher Speed & Density
Affording the Upgrade to Higher Speed & Density Ethernet Summit February 22, 2012 Agenda VSS Overview Technology Q&A 2 Corporate Overview World Leader in Network Intelligence Optimization Deployed in 80%
More informationLTE - Can SDN paradigm be applied?
LTE - Can SDN paradigm be applied? Source of this presentation: Towards Software Defined Cellular Networks Li Erran Li (Bell Labs, Alcatel-Lucent) Morley Mao (University of Michigan) Jennifer Rexford (Princeton
More informationWanderlust: Enabling roaming in the LTE era. Don Troshynski Vice President, Solutions Architecture
Wanderlust: Enabling roaming in the LTE era Don Troshynski Vice President, Solutions Architecture Acme Packet Trusted, first-class services and applications Apps & services Session delivery network April
More informationFULL SPEED AHEAD THE IXIA CHANNEL XCELERATE PROGRAM LATIN AMERICA
FULL SPEED AHEAD THE IIA CHANNEL CELERATE PROGRAM LATIN AMERICA 1998-2016 Ixia All Rights Reserved. Be Part of the Momentum... Nothing beats playing on a winning team. Joining Ixia s Channel celerate Partner
More informationChoosing Tap or SPAN for Data Center Monitoring
Choosing Tap or SPAN for Data Center Monitoring Technical Brief Key Points Taps are passive, silent, and deliver a perfect record of link traffic, but require additional hardware and create a point of
More informationNet Optics Learning Center Presents The Fundamentals of Passive Monitoring Access
Net Optics Learning Center Presents The Fundamentals of Passive Monitoring Access 1 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc. Agenda Goal: Present an overview of Tap
More informationNetwork Performance Channel
Network Performance Channel Net Optics Products Overview MIHAJLO PRERAD, Network Performance Channel GmbH Who we are Network Performance Channel GmbH Leading global value added distributor specialized
More informationThe Evolution of the Central Office
The Gateway to Learning an All IP Network The Evolution of the Central Office -Where did all the DS-1s go? Presented by: Steven Senne, P.E. APRIL 27-30, 2014 ACE/RUS SCHOOL AND SYMPOSIUM 1 The New Central
More informationChannel Xcelerate. Full Speed Ahead. The Ixia Channel Xcelerate Program - The Americas. Application Performance and Security Resilience
Channel celerate Full Speed Ahead The Ixia Channel celerate Program - The Americas Application Performance and Be part of the momentum... Nothing beats playing on a winning team. Since its launch in 2014,
More informationEnsuring Success in a Virtual World: Demystifying SDN and NFV Migrations
Ensuring Success in a Virtual World: Demystifying SDN and NFV Migrations Get Migration Right the First Time The virtualization of traditional networks promises vast and enduring benefits if the challenges
More informationPCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data
White Paper PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data Using credit cards to pay for goods and services is a common practice. Credit cards enable easy and
More informationActive Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA
Active Visibility for Multi-Tiered Security Juergen Kirchmann Director Enterprise Sales EMEA Billions are Spent on Security Annually $18.4B SPENT BY ENTERPRISES WORLD-WIDE ON SECURITY IN 2014 ENTERPRISE
More informationHP FlexNetwork Architecture
HP Networking HP Networking 1 HP FlexNetwork Architecture FlexFabric Flex Campus FlexBranch FlexManagement Converges Network Management and Orchestration Open Scalable Secure Agile Consistent 2 Innovative
More informationSECURE WEB GATEWAY DEPLOYMENT METHODOLOGIES
WHITEPAPER In today s complex network architectures it seems there are limitless ways to deploy networking equipment. This may be the case for some networking gear, but for web gateways there are only
More informationEnhancing Cisco Networks with Gigamon // White Paper
Across the globe, many companies choose a Cisco switching architecture to service their physical and virtual networks for enterprise and data center operations. When implementing a large-scale Cisco network,
More informationAccelerating 4G Network Performance
WHITE PAPER Accelerating 4G Network Performance OFFLOADING VIRTUALIZED EPC TRAFFIC ON AN OVS-ENABLED NETRONOME INTELLIGENT SERVER ADAPTER NETRONOME AGILIO INTELLIGENT SERVER ADAPTERS PROVIDE A 5X INCREASE
More informationCDN/CLOUD/SDN/NFV FOR MULTIMEDIA SERVICES
CDN/CLOUD/SDN/NFV FOR MULTIMEDIA SERVICES Nakjung Choi, Technical Director, Bell Labs Seoul KRnet 2014, June 24 th, 2014 CONTENT Background on CDN/Cloud/SDN/NFV Video Delivery in the Existing Infrastructure
More informationIntel Network Builders Solution Brief. Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks
Intel Network Builders Solution Brief Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks Overview Wireless networks built using small cell base stations are enabling mobile network
More informationAPPENDIX 8 TO SCHEDULE 3.3
APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE
More informationOverview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A
Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A What is NetFlow? Network protocol originally developed by Cisco
More informationThe SDN Opportunity. Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014
The SDN Opportunity Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014 Enterprise is moving to a New Style of IT Networking innovations lay the foundation
More informationNetwork Monitoring Fabrics Are Key to Scaling IT
Network Monitoring Fabrics Are Key to Scaling IT September 2014 Prepared by: Zeus Kerravala Network Monitoring Fabrics Are Key to Scaling IT by Zeus Kerravala September 2014 º º º º º º º º º º º º º º
More informationFail-Safe IPS Integration with Bypass Technology
Summary Threats that require the installation, redeployment or upgrade of in-line IPS appliances often affect uptime on business critical links. Organizations are demanding solutions that prevent disruptive
More informationBoosting Business Agility through Software-defined Networking
Executive Summary: Boosting Business Agility through Software-defined Networking Completing the last mile of virtualization Introduction Businesses have gained significant value from virtualizing server
More informationVPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu
VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
More informationWhite Paper. Simplify Network Monitoring
White Paper Simplify Network Monitoring 26601 Agoura Road, Calabasas, CA 91302 Tel: 818.871.1800 Fax: 818.871.1805 www.ixiacom.com 915-6599-01 Rev. B, June 2013 2 Table of Contents Executive Summary...
More informationNetwork Instruments white paper
Network Instruments white paper RETROSPECTIVE NETWORK ANALYSIS Unified Communications (UC) and other bandwidth-intensive applications can greatly increase network performance requirements. Network professionals
More informationWHITE PAPER. Gaining Total Visibility for Lawful Interception
WHITE PAPER Gaining Total Visibility for Lawful Interception www.ixiacom.com 915-6910-01 Rev. A, July 2014 2 Table of Contents The Purposes of Lawful Interception... 4 Wiretapping in the Digital Age...
More informationUsing SDN-OpenFlow for High-level Services
Using SDN-OpenFlow for High-level Services Nabil Damouny Sr. Director, Strategic Marketing Netronome Vice Chair, Marketing Education, ONF ndamouny@netronome.com Open Server Summit, Networking Applications
More informationImplementing VoIP monitoring solutions. Deployment note
Implementing VoIP monitoring solutions Deployment note Introduction With VoIP being an integral part of modern day business communications, enterprises are placing greater emphasis on the monitoring and
More informationScalable Network Monitoring with SDN-Based Ethernet Fabrics
Scalable Network Monitoring with SDN-Based Ethernet Fabrics Prashant Gandhi VP, Product Management & Strategy Big Switch Networks 1 Agenda Trends in Network Monitoring SDN s Role in Network Monitoring
More informationBusiness Case for Brocade Network Analytics for Mobile Network Operators
Business Case for Brocade Network Analytics for Mobile Network Operators Executive Summary Mobile operators are experiencing large cost increases as they build out their networks to keep pace with rising
More informationtap into your network product brochure
tap into your network product brochure Leadership Net Optics is dedicated to helping customers obtain the highest efficiency from their networks. Our products help Network IT and security professionals
More informationLive traffic feeds are increasingly being used by the modern enterprise to gain visibility for security and operations management
Overview The transition from an age of systems of record to an age of systems of engagement has led to profound changes in the way information is used in an organization. These changes have now become
More informationTechPartner Program Enables Full Network Visibility Across Complex Health Care Delivery System
PARTNER CASE STUDY: IXIA 2016 TechPartner Program Enables Full Network Visibility Across Complex Health Care Delivery System Ixia helps hospital group extend network monitoring capabilities while leveraging
More informationLinux KVM Virtual Traffic Monitoring
Linux KVM Virtual Traffic Monitoring East-West traffic visibility Scott Harvey Director of Engineering October 7th, 2015 apcon.com Speaker Bio Scott Harvey Director of Engineering at APCON Responsible
More informationHow To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
More informationTaps vs. SPAN The Forest AND the Trees: Full Visibility into Today's Networks
WHITE PAPER Taps vs. SPAN The Forest AND the Trees: Full Visibility into Today's Networks www.ixiacom.com 915-3534-01 Rev. A, September 2015 2 Table of Contents The First Line of Defense: Access... 5 Problem
More informationOpen networks: Turning the vision into reality
Open networks: Turning the vision into reality Today s growing ecosystem of open networking technologies helps IT leaders deliver exceptional agility, scalability and manageability to their data center
More informationSDN Applications in Today s Data Center
SDN Applications in Today s Data Center Harry Petty Director Data Center & Cloud Networking Cisco Systems, Inc. Santa Clara, CA USA October 2013 1 Customer Insights: Research/ Academia OpenFlow/SDN components
More informationWireless & Mobile. Working Group
Wireless & Mobile Working Group Table of Contents 1 Executive Summary... 3 2 Mission & Motivation... 3 3 Scope... 3 4 Goals & Non-Goals... 4 5 Deliverables... 5 6 Milestones... 6 7 Example Use Cases Summaries...
More informationThe Next Generation Network:
JULY, 2012 The Next Generation Network: Why the Distributed Enterprise Should Consider Multi-circuit WAN VPN Solutions versus Traditional MPLS Tolt Solutions Network Services 125 Technology Drive Suite
More informationPacket Optimization & Visibility with Wireshark and PCAPs. Gordon Beith Director of Product Management VSS Monitoring
Packet Optimization & Visibility with Wireshark and PCAPs Gordon Beith Director of Product Management VSS Monitoring 1 Market Trends - Innovation MOBILE LTE INFRASTRUCTURE COMPLEXITY BIG DATA BUSINESS
More informationIP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses
IP Telephony Basics Part of The Technology Overview Series for Small and Medium Businesses What is IP Telephony? IP Telephony uses the Internet Protocol (IP) to transmit voice or FAX traffic over a public
More informationSecure Access Complete Visibility
PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE Intrusion Detection Switch TAP Data Recorder VoIP Analyzer Switch Secure Access Complete Visibility Web
More informationExtending Network Visibility by Leveraging NetFlow and sflow Technologies
Extending Network Visibility by Leveraging and sflow Technologies This paper shows how a network analyzer that can leverage and sflow technologies can provide extended visibility into enterprise networks
More informationdomain is known as the high side, and the less secure domain is the low side. Depending on the application, the
Data diodes refer to unidirectional network links used in some high-security network architectures. This paper explains how data diodes are used to secure information and protect against intrusions; it
More informationHIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES
HIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES Net Optics solutions dramatically increase reliability,
More informationGet the best performance from your LTE Network with MOBIPASS
Get the best performance from your LTE Network with MOBIPASS The most powerful, user friendly and scalable enodeb test tools family for Network Equipement Manufacturers and Mobile Network Operators Network
More informationBusiness Case for Virtual Managed Services
Business Case for Virtual Managed Services Executive Summary Managed services allow businesses to offload day-to-day network management tasks to service providers and thus free up internal talent to focus
More informationNet Optics and Cisco NAM
When Cisco decided to break its Network Analysis Module (NAM) out of the box and into a stand-alone appliance, they turned to Net Optics for monitoring access connectivity. Cisco NAM 2200 Series Cisco
More informationA Mock RFI for a SD-WAN
A Mock RFI for a SD-WAN Ashton, Metzler & Associates Background and Intended Use After a long period with little if any fundamental innovation, the WAN is now the focus of considerable innovation. The
More informationNetwork Performance Monitoring at Minimal Capex
Network Performance Monitoring at Minimal Capex Some Cisco IOS technologies you can use to create a high performance network Don Thomas Jacob Technical Marketing Engineer About ManageEngine Network Servers
More informationConfiguration Management: Best Practices White Paper
Configuration Management: Best Practices White Paper Document ID: 15111 Contents Introduction High Level Process Flow for Configuration Management Create Standards Software Version Control and Management
More informationTHE ON-DEMAND DATA CENTER NETWORK TRANSFORMATION IN A CHANGING INDUSTRY. Ken Cheng, CTO, Brocade October, 2013
THE ON-DEMAND DATA CENTER NETWORK TRANSFORMATION IN A CHANGING INDUSTRY Ken Cheng, CTO, Brocade October, 2013 Fundamentally we ve had to redesign and challenge the way we ve run distributed infrastructure
More informationStrategic Direction of Networking IPv6, SDN and NFV Where Do You Start?
Strategic Direction of Networking IPv6, SDN and NFV Where Do You Start? Yanick Pouffary HP Distinguished Technologist, Chief Technologist Technology Services Mobility & Networking Forward-looking statements
More informationMeraki 2015 Solution Brochure
Meraki 2015 Solution Brochure Introduction 100% Cloud Managed Enterprise Networks Cisco Meraki cloud managed edge, branch, and campus networking solutions bring simplicity to enterprise-class networks.
More informationIntroduction to M2M Technologies What Wireless or Wired Option is Right For Your Company or Products
Introduction to M2M Technologies What Wireless or Wired Option is Right For Your Company or Products Webinar. December 15, 2015. Syed Zaeem Hosain ( Z ), CTO, Aeris. Syed.Hosain@aeris.net, Twitter: @AerisCTO
More informationRedefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance
White Paper Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance What You Will Learn Modern data centers power businesses through a new generation of applications,
More informationIn-Band Security Solution // Solutions Overview
Introduction The strategy and architecture to establish and maintain infrastructure and network security is in a rapid state of change new tools, greater intelligence and managed services are being used
More informationWAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO
WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO The number of branch-office work sites is increasing, so network administrators need tools to
More informationScalable Network Monitoring with SDN-Based Ethernet Fabrics
Scalable Network Monitoring with SDN-Based Ethernet Fabrics Prashant Gandhi VP, Products & Strategy Big Switch Networks gandhi@bigswitch.com 1 Agenda Trends in Network Monitoring SDN s Role in Network
More informationvsrx Services Gateway: Protecting the Hybrid Data Center
Services Gateway: Protecting the Hybrid Data Center Extending Juniper Networks award-winning security products to virtualized, cloud-based, and hybrid IT environments Challenge Virtualization and cloud
More informationHuawei Agile Network FAQ... 2. 1 What is an agile network? What is the relationship between an agile network and SDN?... 2
Contents Huawei Agile Network FAQ... 2 1 What is an agile network? What is the relationship between an agile network and SDN?... 2 2 What is an agile campus?... 3 3 What are the benefits of an agile network?...
More informationWHITE PAPER. Network Traffic Port Aggregation: Improved Visibility, Security, and Efficiency
WHITE PAPER Network Traffic Port Aggregation: Improved Visibility, Security, and Efficiency www.ixiacom.com 915-6893-01 Rev. A, July 2014 2 Table of Contents Summary... 4 Introduction... 4 Differing Goals
More informationBIG-IP ASM plus ibypass Switch
White Pap er ibypass Switch maximizes application uptime. by F5 Networks and Net Optics Contents Introduction 3 How it works 4 Bypass Off 4 Bypass On 4 Heartbeat TM Packet 5 ibypass TM Switch 6 Media conversion
More informationObserver Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
More informationSecurity Solutions for the New Threads
Security Solutions for the New Threads We see things others can t Pablo Grande Sales Director, SOLA pgrande@arbor.net What a CISO Is Looking For Show Progress on Response Time Measurably improve our incident
More informationTraffic Visibility Networking (TVN) can Simplify and Scale IT Operations in a Networked World
Traffic Visibility Networking (TVN) can Simplify and Scale IT Operations in a Networked World January 2012 Prepared by: Zeus Kerravala Traffic Visibility Networking (TVN) can Simplify and Scale IT Operations
More informationMonitoring Service Delivery in an MPLS Environment
Monitoring Service Delivery in an MPLS Environment A growing number of enterprises depend on (or are considering) MPLS-based routing to guarantee high-bandwidth capacity for the real-time applications
More informationIntelligent Data Access Networking TM
Gigamon TM delivers intelligent data access solutions to enhance monitoring of service provider and enterprise data centers. The company s world-renowned GigaVUE orange boxes aggregate, filter and replicate
More informationThe NSF SecureCloud Project: Cybersecurity for Enterprise Class Data Centers
The NSF SecureCloud Project: Cybersecurity for Enterprise Class Data Centers Casimer DeCusatis, Ph.D. Assistant Professor, Marist College @Dr_Casimer HVCSC Overview Introduction to Marist College & the
More informationThe Economics of Cisco s nlight Multilayer Control Plane Architecture
The Economics of Cisco s nlight Multilayer Control Plane Architecture Executive Summary Networks are becoming more difficult to plan and optimize because of high traffic growth, volatile traffic patterns,
More informationIntelligent WAN 2.0 principles. Pero Gvozdenica, Systems Engineer, pero.gvozdenica@combis.hr Vedran Hafner, Systems Engineer, vehafner@cisco.
Intelligent WAN 2.0 principles Pero Gvozdenica, Systems Engineer, pero.gvozdenica@combis.hr Vedran Hafner, Systems Engineer, vehafner@cisco.com Then VS Now Intelligent WAN: Leveraging the Any Transport
More informationICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
More informationThe All-in-one Guest Access Solution of
The All-in-one Guest Access Solution of Redefining Networking Integration Tomorrow, Delivered Today Application Guide Series Series Application Guide Providing access in hospitality venues is not the same
More informationApplication Performance Management - Deployment Best Practices Using Ixia- Anue Net Tool Optimizer
Application Performance Management - Deployment Best Practices Using Ixia- Anue Net Tool Optimizer Purpose: Overview on how to use Ixia s Anue Network Tool Optimizer (NTO) to provide the CA Application
More information